Skip to content

facumenzella/steganography-in-images

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Steganography in images

Hiding Data Within Data

By Alderete, De la Puerta, Menzella & Romarion.

Criptography & security

ITBA

The document explaining our work it's inside the doc folder, you might want to check it out first.

Try running 'make help' if it is your first time. If you do not remember the arguments, run 'make arguments'.

You may be wondering...how do I run this amazing app? Well, it's easy.

Distribution mode example:
./sii -d -s ../lena/lena512.bmp -k 8 -n 8 -dir ../porters/

Recover mode example:
./sii -r -s ../output/ -k 8 -dir ../porters/
 
 -d,--distribute                Distribute a source image into other shadow images
 -dir,--directory <DIRECTORY>   Either he directory where the images where the secret will be
                                distributed (in case you have chosen the option (-d)), or where
                                images containing hidden secret (in case they are chosen option
                                (-r)). If not used, the program will search the images in the
                                current directory.
 -h,--help                      Print help
 -k,--mshadows <NUMBER>         Minimum amount of shadows needed to recover the secret image
 -n,--fshadows <NUMBER>         Final amount of shadows where the image will be distributed
 -r,--recover                   Recover a secret image from k source images
 -s,--secret <IMAGE>            Either source image to distribute (in case you have chosen the
                                option (d)) or recovered image (in case they are chosen option (-r))

All rights reserved

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published